A personal contact approach is often used when hackers just want you to click the link. Many people don’t think twice about clicking a funny “youtube” link from a friend or relative to lift their spirits at work. But if the email address is unusual, don’t. Besides, why aren’t they sharing it with you on Twitter like usual? Continue Reading
Hackers will do anything to hack your network, steal money, or gain access to sensitive data. Hackers are also incredibly lazy. While they could compete with you in single cybersecurity combat; your firewalls vs their blackhat skills, they’d rathe take the coward’s way and trick an employee into breaching security for them.
This is known as a social engineering hack; When a hacker uses phone, email, or chat to fool an employee into using their own access to expose the network to malware, wire money, or send over sensitive information. The reason it works is beacuse hackers are good at coming up with a con-artists’s line that convinces staff members that they are legitmate despite any warning signs.
The best defense against this type of attack is to know what’s coming. not only that clicking links and doing unconfirmed favors is bad, but the types of lines that hackers use and why they have worked in the past. So let’s dive right into the psychology and methods of the social hacker. Continue Reading
Most phishing email goes after mass targets. It’s not particularly well-crafted, but the senders expect that if they hit enough mailboxes, some victims will open the attachment or visit the malicious website. A growing portion, though, targets specific companies or individuals with carefully crafted messages. It’s called spearphishing. When it’s aimed at high-profile individuals or large assets, it’s also called whaling — going after really big fish. (All right, a whale isn’t really a fish.) Continue Reading
Welcome back to the second half of our two-part series on when and why your business should be using encryption. If you joined us last time, you’ve probably started to realize just how useful encryption is and that it can be applied to anything you’d like to keep safe from hackers, whether or not they make it past your firewall. In the first half, we covered encrypting client payment data at every stage and began to talk about the risk of identity theft if hackers get ahold of either client or employee personal information. Let’s pick back up where we left off at storing personal information once you’ve collected it. Continue Reading